• Tidak ada hasil yang ditemukan

DEFENDING WORMHOLE ATTACK IN WIRELESS AD

N/A
N/A
Protected

Academic year: 2018

Membagikan "DEFENDING WORMHOLE ATTACK IN WIRELESS AD"

Copied!
10
0
0

Teks penuh

(1)

DEFENDING WORMHOLE ATTACK IN

WIRELESS AD-HOC NETWORK USING AD-HOC

ON DEMAND DISTANCE VECTOR

Dr.V.Khanaa, Raju M, Sangeetha N

Professor, BIST, Bharath Institute of Higher Education and Research.Bharath University ,drvkannan62@yahoo.com

P.G. Student, M.E CSE, RRASE College of Engg, Chennai, T.N, India. Assistant Professor, Dept of CSE, RRASE College of Engg, Chennai, T.N, India.

Abstract The ad-hoc networks are the momentarily confirmed wireless networks it does not need stable infrastructure it is also called as infrastructure less network. Because of some flaws of ad-hoc network equally mutual wireless middle and shortage of any important coordination makes them more prone to attacks in comparison with the wired network. Among all the attacks wormhole onslaught is the most highest harsh attack. So this onslaught an attacker arrest the packets at one location in the network and send it two another attacker at a distant location through tunnels which is stable over divergent ways like packet enclose, using great power transmission or by using direct antennas. This tunnel between two colluding attackers is virtual and virtual is called stair a wormhole. The wormhole onslaught is workable alike if the attacker has not comprised any hosts, and all communication provides authenticity and confidentiality. By using the various approaches for discover the solution up wormhole attack, the changing information of the packets could still be modified. So in order to give more robust protection in some special scenario like arena, which needs highly secured clue, there is required of establish some secured mechanism for wormhole detection and prevention. Taking into consideration this problem the proposed theory is developed. This paper argue proposed works on wormhole attack along with its available counter measures in ad-hoc wireless network.

Keywords Machine learning, Wireless, coding and information theory, Markov process, Algorithm/protocol design and analysis

I. INTRODUCTION

(2)

introduced in the context of ad hoc networks. In wormhole attack malicious node captures packets from one location in the network, and “tunnels” them to another malicious node at a far. The tunnel is established through different ways like packet encapsulation, using high power transmission or by using direct antennas it makes the tunnelled packet arrive either earlier or with number of hops lesser compared to the packets transmitted over normal multihop routes. This creates the illusion that these two nodes provide the shortest path through them[8-11].

1. ALGORITHM

A wormhole tunnel can actually be useful if used for forwarding all the packets, it puts the attacker in powerful position compared to other nodes in the network, which the attacker could use in a manner that could compromise the security of the network. In wormhole attack the two remote regions are directly

connected through nodes (malicious) that appear to be neighbors but are actually distant from one another as shown in the figure1. Such wormhole attack results in the false route. So the wormhole attack is one of the most severe threats to ad-hoc networks, as it can do harm to both sender and receiver by performing packet dropping or alteration. This paper is organized as follows. lists the wormhole attack modes in , we discuss the solutions that have been proposed in the literature as a countermeasure for this attack[12-17]. Finally proposed approach for mitigating wormhole and conclusion

II. RELATED WORKS

It describes the Stream Control Transmission Protocol (SCTP). SCTP is designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks, but is capable of broader applications. SCTP is a reliable transport protocol operating on top of a connectionless packet network such as IP. It offers the following services to its users: acknowledged error-free non-duplicated transfer of user data, data fragmentation to conform to discovered path MTU size, sequenced delivery of user messages within multiple streams, with an option for order-of-arrival delivery of individual user messages, optional bundling of multiple user messages into a single SCTP packet, and network-level fault tolerance through supporting of multi-homing at either or both ends of an association[18]. The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.

Investigates end-to-end Concurrent Multipath Transfer (CMT) using SCTP multihoming for increased application throughput and reliability. CMT is the simultaneous transfer of new data from a source host to a destination host via two or more end-to-end paths. Simultaneous transfer of new data to multiple destination addresses is a natural extension to SCTP multihoming, but there are several design considerations.

(3)

Show that, provided packet headers can be used to carry an amount of side-information that grows arbitrarily large (but independently of payload size), random linear network coding achieves packet-level capacity for both single uncast and single multicast links. In the special case of Poisson traffic with i.i.d. losses, we give error exponents that quantify the rate of decay of the probability of error with coding delay. Our analysis of random linear network coding shows not only that it achieves packet-level capacity, but also that the propagation of packets carrying “innovative” information follows the propagation of jobs through a queueing network, thus implying that fluid flow models yield good approximations.

On Coding for Reliable Communication over Packet Networks (Lun, Medard, and Effros, 2004), a capacity-achieving coding scheme for unicast or multicast over lossy wireline or wireless packet networks is presented. We extend that paper’s results in two ways: First, we extend the network model to allow packets received on a link to arrive according to any process with an average rate, as opposed to the assumption of Poisson traffic with losses that was

III. DESIGN AND IMPLEMENTATION

In order to give more robust protection in some special scenario like battlefields, where highly secured information is required there is a need of developing some secured mechanism for wormhole detection and prevention[21-24]. So our aim is to

 .Detection/removal of cooperative Black hole attack in MANET.

 Analysis of black hole and gray hole attack on RPAODV in MANET. black hole attack in MANET

 Active detection routing and date routing

Wireless networks are merged, in order to obtain the shortest path usually Distance Vector or Link state routing protocols are used[20]. These protocols do not per form well in ad-hoc wireless networks because wireless ad-hoc networks have limited bandwidth and there is no central control. Ad-hoc wireless networks are differ rent from other networks because of the characteristics like absence of centralized control, each node has wireless interface, nodes can move around freely which results in f requent changes in network topology, nodes have limited amount of resources and lack of symmetrical links i.e. transmission does not usually perform equally well in both directions. Therefore, modifications to these routing protocols or totally new routing protocols are required for the ad hoc wireless domain. Presently, there are f our ad-hoc routing protocols in demand for wireless ad-hoc networks i.e. AODV , DSR , TORA and OLSR . From the various ad-hoc routing protocols proposed, the authors founded TORA, DSR and for ad-hoc on-demand distance vector (AODV) routing protocols as most promising and compared them TORA is a distributed routing protocol for ad-hoc networks,

(4)

However, when the network size was increased to 80 and 100 nodes, for DSR, the number of packets in routing traffic received and sent, as well as the number of packets in total traffic received and sent, increase with increasing load[25-28]. However, for route discovery time and the number of hops per route, the performance depends primarily on the algorithm rather than on the load. For TORA, the number of packets in control traffic received and sent, as well as in ULP traffic received and sent, increases with the increment of loads. In the case of AODV, varying the number of nodes has no effect on the number of hops per route or route discovery time. Therefore, it was concluded that for specific differentials, TORA shows better performance over the two on-demand protocols, that is DSR and AODV.

System Initialization

In order to give more robust protection in some special scenario like battlefields, where highly secured information is required there is a need of developing some secured mechanism for wormhole detection and prevention[29-33]. So our aim is to build a robust and secure mechanism for preventing the devastating effects caused by the wormhole attack

IV. CONCLUSION & FUTURE WORK

We have mentioned the AODV protocol and Black hole attack in MANET. We have proposed a feasible solution for Black hole attack that can be implemented on the AODV protocol. The proposed method can be used to find the malicious node. Based on the trust value of node we define which path is most suitable for routing the packet and Untrusted node can easily remove or ignored[34-36]. As future work, we intend to develop simulation to analyze the performance of proposed solution based on the security parameters like packet overhead, memory usage, and mobility.

V. REFERENCES

(5)

using

thermoelectric

cooler,

International Journal of Pure and

Applied Mathematics, V-116, I-14

Special Issue, PP-585-589, 2017

2.

Nakkeeran

S.,

Hussain

J.H.,

Innovative technique for running a

petrol engine with diesel as a fuel,

International Journal of Pure and

Applied Mathematics, V-116, I-18

Special Issue, PP-41-44, 2017

3.

Naveenchandran P., Vijayaragavan

S.P., A sensor less control of SPM

using fuzzy and ANFIS technique,

International Journal of Pure and

Applied Mathematics, V-116, I-13

Special Issue, PP-43-50, 2017

4.

Hameed Hussain J., Nakkeeran S.,

Design and development of pepper

plucking equipment, International

Journal

of

Pure

and

Applied

Mathematics, V-116, I-14 Special

Issue, PP-573-576, 2017

5.

Naveenchandran P., Vijayaragavan

S.P., A high performance inverter

fed energy efficient cum compact

microcontroller

based

power

conditioned distributed photo voltaic

system, International Journal of Pure

and Applied Mathematics, V-116,

I-13 Special Issue, PP-165-169, 2017

6.

Golden RenjithNimal R.J., Hussain

J.H., Stress analysis of gear tooth

using metal, International Journal of

Pure and Applied Mathematics,

V-116, I-17 Special Issue, PP-317-322,

2017

7.

Hameed Hussain J., Hariharan R.,

Development of temperature-time

and pressure-time diagrams for

diffusion

bonding

ti-aa7075

dissimilar materials, International

Journal

of

Pure

and

Applied

Mathematics, V-116, I-14 Special

Issue, PP-493-499, 2017

8.

Udayakumar

R.,

Khanaa

V.,

Saravanan T., Saritha G., Cross layer

optimization for wireless network

(WIMAX), Middle - East Journal of

Scientific Research, V-16, I-12,

PP-1786-1789, 2013

9.

Khanaa

V.,

Thooyamani

K.P.,

Udayakumar R., Cognitive radio

based network for ISM band real

time embedded system, Middle -

East Journal of Scientific Research,

V-16, I-12, PP-1798-1800, 2013

10.

Khanaa V., Mohanta K., Saravanan

T., Comparative study of uwb

communications over fiber using

direct and external modulations,

Indian Journal of Science and

Technology, V-6, I-SUPPL.6,

PP-4845-4847, 2013

11.

Kumarave A., Udayakumar R., Web

portal visits patterns predicted by

intuitionistic fuzzy approach, Indian

Journal of Science and Technology,

V-6,

I-SUPPL5,

PP-4549-4553,

2013

12.

Thooyamani

K.P.,

Khanaa

V.,

Udayakumar R., An integrated agent

system for e-mail coordination using

jade, Indian Journal of Science and

Technology, V-6, I-SUPPL.6,

PP-4758-4761, 2013

13.

Sengottuvel P., Satishkumar S.,

Dinakaran

D.,

Optimization

of

multiple characteristics of EDM

parameters based on desirability

approach

and

fuzzy

modeling,

Procedia Engineering, V-64,

PP-1069-1078, 2013

(6)

films of sno2 prepared by spray

pyrolysis technique, Indian Journal

of Science and Technology, V-6,

I-SUPPL.6, PP-4754-4757, 2013

15.

Udayakumar R., Kumarave A.,

Rangarajan

K.,

Introducing

an

efficient programming paradigm for

object-oriented distributed systems,

Indian Journal of Science and

Technology, V-6, I-SUPPL5,

PP-4596-4603, 2013

16.

KeranaHanirex D., Kaliyamurthie

K.P., Multi-classification approach

for

detecting

thyroid

attacks,

International Journal of Pharma and

Bio Sciences, V-4, I-3,

PP-B1246-B1251, 2013

17.

Udayakumar

R.,

Khanaa

V.,

Kaliyamurthie K.P., Performance

analysis of resilient ftth architecture

with protection mechanism, Indian

Journal of Science and Technology,

V-6,

I-SUPPL.6,

PP-4737-4741,

2013

18.

Udayakumar

R.,

Khanaa

V.,

Kaliyamurthie K.P., Optical ring

architecture performance evaluation

using ordinary receiver, Indian

Journal of Science and Technology,

V-6,

I-SUPPL.6,

PP-4742-4747,

2013

19.

Udayakumar

R.,

Khanaa

V.,

Saravanan T., Chromatic dispersion

compensation

in

optical

fiber

communication

system

and

its

simulation, Indian Journal of Science

and Technology, V-6, I-SUPPL.6,

polarization mode dispersion in

fibers and its mitigation using an

optical

compensation

technique,

Indian Journal of Science and

Technology, V-6, I-SUPPL.6,

PP-4767-4771, 2013

22.

Gopalakrishnan K., PremJeya Kumar

M., SundeepAanand J., Udayakumar

R., Thermal properties of doped

azopolyester and its application,

Indian Journal of Science and

Technology, V-6, I-SUPPL.6,

PP-4722-4725, 2013

23.

Udayakumar

R.,

Khanaa

V.,

Kaliyamurthie K.P., High data rate

for

coherent

optical

wired

communication using DSP, Indian

Journal of Science and Technology,

V-6,

I-SUPPL.6,

PP-4772-4776,

2013

24.

KeranaHanirex D., Kaliyamurthie

K.P., Kumaravel A., Analysis of

improved tdtr algorithm for mining

frequent itemsets using dengue virus

type

1

dataset:

A

combined

approach, International Journal of

Pharma and Bio Sciences, V-6, I-2,

PP-B288-B295, 2015

25.

Thooyamani

K.P.,

Khanaa

V.,

Udayakumar R., Using integrated

circuits with low power multi bit

flip-flops

in

different

approch,

Middle - East Journal of Scientific

Research, V-20, I-12, PP-2586-2593,

2014

(7)

27.

Thooyamani

K.P.,

Khanaa

V.,

Udayakumar R., Partial encryption

and partial inference control based

disclosure in effective cost cloud,

Middle - East Journal of Scientific

Research, V-20, I-12, PP-2456-2459,

2014

28.

Sundar Raj M., Saravanan T.,

Srinivasan V., Design of

silicon-carbide based cascaded multilevel

inverter, Middle - East Journal of

Journal of Scientific Research, V-20,

I-12, PP-2042-2046, 2014

30.

Kanniga

E.,

Srikanth

S.M.K.,

Sundhararajan

M.,

Optimization

solution of equal dimension boxes in

container loading problem using a

permutation block algorithm, Indian

Journal of Science and Technology,

V-7, PP-22-26, 2014

31.

Arulselvi S., Sundararajan M., Smart

control system in traffic analysis

using

RTK-GPS

standards,

International Journal of Pure and

Applied Mathematics, V-116, I-15

Special Issue, PP-349-352, 2017

32.

Arulselvi

S.,

Karthik

B.,

Sundararajan M., A frame work for

road

network

extraction

from

remotely sensed high resolution

images, International Journal of Pure

and Applied Mathematics, V-116,

I-15 Special Issue, PP-355-360, 2017

33.

Arulselvi

S.,

Karthik

B.,

Sundararajan M., Super resolution

method for Thumbnail Web image,

International Journal of Pure and

Applied Mathematics, V-116, I-15

Special Issue, PP-369-373, 2017

34.

Arulselvi

S.,

Karthik

B.,

Sundararajan M., Linear framework

free rewriting systems, International

Journal

of

Pure

and

Applied

Mathematics, V-116, I-15 Special

Issue, PP-363-367, 2017

35.

Kanniga E., Selvaramarathnam K.,

Sundararajan M., Kandigital bike

operating system, Middle - East

Journal of Scientific Research, V-20,

I-6, PP-685-688, 2014

36.

Lakshmi

C.,

Ponnavaikko

M.,

Sundararajan M., Improved kernel

common vector method for face

recognition varying in background

conditions,

Lecture

Notes

in

Computer

Science

(including

subseries Lecture Notes in Artificial

Intelligence and Lecture Notes in

Bioinformatics), V-6026 LNCS,

PP-175-186, 2010

37.

M.

Rajesh,

K.Sathesh

Kumar,

K.Shankar,

M.

Ilayaraja.,

SENSITIVE DATA SECURITY IN

CLOUD COMPUTING AID OF

DIFFERENT

ENCRYPTION

TECHNIQUES,

Journal

of

Advanced Research in Dynamical

and Control Systems, Volume 18,

PP-2888-2899, 2017

38.

M. Rajesh, A signature based

information security system for

vitality

proficient

information

accumulation in wireless sensor

systems, International Journal of

Pure and Applied Mathematics,

Volume 118, Issue 9, Pages 367-387

39.

M. Rajesh, A Review on Excellence

(8)

Pure and Applied Mathematics,

Volume 118, Issue 9, Pages 407-412

40.

Rajesh, M., and J. M. Gnanasekar.

"Path Observation Based Physical

Routing Protocol for Wireless Ad

Hoc Networks." Wireless Personal

Communications 97.1 (2017):

1267-1289.

41.

Rajesh, M., and J. M. Gnanasekar.

"Congestion Control Scheme for

Heterogeneous Wireless Ad Hoc

Networks Using Self-Adjust Hybrid

Model." International Journal of Pure

and

Applied

Mathematics

116

(2017): 537-547.

(9)
(10)

Referensi

Dokumen terkait

Na’im dan Rakhman (2000) juga menyatakan bahwa perusahaan dengan rasio hutang atas modal tinggi akan mengungkapkan lebih banyak informasi dalam laporan keuangan

Mahasiswa dapat menjawab pertanyaan tentang teks yang berjudul activity and science of economics dengan benar.. Mahasiswa dapat mengubah kalimat

of participation by DPR Korea in intercountry meetings and international meetings on public health policies Improving skills • in research methodology, applied

Aktifitas perbankan yang pertama adalah menghimpun dana dari masyarakat luas yang dikenal dengan istilah di dunia perbankan adalah kegiatan f unding.. Pengertian

Sebagai sumber contoh, untuk mengkaji kreadibilitas data tentang media balon untuk meningkatkan kemampuan bernyanyi pada anak usia dini, maka pengumpulan data dan

vertical drain pada lunak yang dilihat dari besar penurunan per hari dan penurunan secara akumulatif dalam durasi 3 minggu atau 21 hari dengan kolom kelompok

Tujuan penulisan skripsi ini adalah untuk menganalisis metode penetapan harga yang diterapkan oleh perusahaan yaitu metode markup pricing pada keempat produknya, sehingga

Tulisan ini menyajikan hasil analisis data konsumsi makanan Riskesdas 2010 untuk mengetahui gambaran keragaman makanan dan sumbangannya terhadap konsumsi energi